Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 39.153172] ================================================================== [ 39.167539] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 39.174395] Read of size 1 at addr ffff800089507c2a by task kunit_try_catch/296 [ 39.181685] [ 39.183173] CPU: 2 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 39.183229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.183248] Hardware name: WinLink E850-96 board (DT) [ 39.183272] Call trace: [ 39.183288] show_stack+0x20/0x38 (C) [ 39.183325] dump_stack_lvl+0x8c/0xd0 [ 39.183363] print_report+0x310/0x608 [ 39.183400] kasan_report+0xdc/0x128 [ 39.183436] __asan_report_load1_noabort+0x20/0x30 [ 39.183476] kasan_stack_oob+0x238/0x270 [ 39.183506] kunit_try_run_case+0x170/0x3f0 [ 39.183545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.183583] kthread+0x328/0x630 [ 39.183610] ret_from_fork+0x10/0x20 [ 39.183645] [ 39.245751] The buggy address belongs to stack of task kunit_try_catch/296 [ 39.252606] and is located at offset 138 in frame: [ 39.257465] kasan_stack_oob+0x0/0x270 [ 39.261204] [ 39.262673] This frame has 4 objects: [ 39.266323] [48, 49) '__assertion' [ 39.266348] [64, 72) 'array' [ 39.269794] [96, 112) '__assertion' [ 39.272744] [128, 138) 'stack_array' [ 39.276301] [ 39.281428] The buggy address belongs to the virtual mapping at [ 39.281428] [ffff800089500000, ffff800089509000) created by: [ 39.281428] kernel_clone+0x150/0x7a8 [ 39.296701] [ 39.298181] The buggy address belongs to the physical page: [ 39.303736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646e [ 39.311721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.318243] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.325960] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.333680] page dumped because: kasan: bad access detected [ 39.339235] [ 39.340710] Memory state around the buggy address: [ 39.345492] ffff800089507b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.352694] ffff800089507b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 39.359899] >ffff800089507c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 39.367099] ^ [ 39.371616] ffff800089507c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 39.378821] ffff800089507d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.386023] ==================================================================
[ 28.786393] ================================================================== [ 28.786557] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 28.786691] Read of size 1 at addr ffff800080a07c2a by task kunit_try_catch/249 [ 28.786829] [ 28.786958] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.787642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.787746] Hardware name: linux,dummy-virt (DT) [ 28.787956] Call trace: [ 28.788021] show_stack+0x20/0x38 (C) [ 28.788533] dump_stack_lvl+0x8c/0xd0 [ 28.788686] print_report+0x310/0x608 [ 28.789054] kasan_report+0xdc/0x128 [ 28.789180] __asan_report_load1_noabort+0x20/0x30 [ 28.789308] kasan_stack_oob+0x238/0x270 [ 28.789483] kunit_try_run_case+0x170/0x3f0 [ 28.789993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.790197] kthread+0x328/0x630 [ 28.790319] ret_from_fork+0x10/0x20 [ 28.790618] [ 28.790823] The buggy address belongs to stack of task kunit_try_catch/249 [ 28.791142] and is located at offset 138 in frame: [ 28.791237] kasan_stack_oob+0x0/0x270 [ 28.791561] [ 28.791647] This frame has 4 objects: [ 28.791951] [48, 49) '__assertion' [ 28.792489] [64, 72) 'array' [ 28.792583] [96, 112) '__assertion' [ 28.792971] [128, 138) 'stack_array' [ 28.793204] [ 28.793285] The buggy address belongs to the virtual mapping at [ 28.793285] [ffff800080a00000, ffff800080a09000) created by: [ 28.793285] kernel_clone+0x150/0x7a8 [ 28.793476] [ 28.793535] The buggy address belongs to the physical page: [ 28.793692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f6 [ 28.794417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.794591] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.794998] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.795122] page dumped because: kasan: bad access detected [ 28.795225] [ 28.795290] Memory state around the buggy address: [ 28.795642] ffff800080a07b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.796092] ffff800080a07b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 28.796212] >ffff800080a07c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 28.796322] ^ [ 28.796408] ffff800080a07c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 28.796516] ffff800080a07d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.796781] ==================================================================
[ 28.914288] ================================================================== [ 28.915029] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 28.915220] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/249 [ 28.915567] [ 28.915660] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.915897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.916059] Hardware name: linux,dummy-virt (DT) [ 28.916241] Call trace: [ 28.916339] show_stack+0x20/0x38 (C) [ 28.916468] dump_stack_lvl+0x8c/0xd0 [ 28.916654] print_report+0x310/0x608 [ 28.917023] kasan_report+0xdc/0x128 [ 28.917201] __asan_report_load1_noabort+0x20/0x30 [ 28.917558] kasan_stack_oob+0x238/0x270 [ 28.917700] kunit_try_run_case+0x170/0x3f0 [ 28.917872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.918026] kthread+0x328/0x630 [ 28.919015] ret_from_fork+0x10/0x20 [ 28.919231] [ 28.919353] The buggy address belongs to stack of task kunit_try_catch/249 [ 28.919609] and is located at offset 138 in frame: [ 28.919727] kasan_stack_oob+0x0/0x270 [ 28.920085] [ 28.920158] This frame has 4 objects: [ 28.920377] [48, 49) '__assertion' [ 28.920494] [64, 72) 'array' [ 28.920580] [96, 112) '__assertion' [ 28.920719] [128, 138) 'stack_array' [ 28.920909] [ 28.921003] The buggy address belongs to the virtual mapping at [ 28.921003] [ffff800080a90000, ffff800080a99000) created by: [ 28.921003] kernel_clone+0x150/0x7a8 [ 28.921946] [ 28.922025] The buggy address belongs to the physical page: [ 28.922326] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776f [ 28.922736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.922982] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.923248] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.923676] page dumped because: kasan: bad access detected [ 28.923979] [ 28.924065] Memory state around the buggy address: [ 28.924155] ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.924717] ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 28.924921] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 28.925104] ^ [ 28.925161] ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 28.925220] ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.925300] ==================================================================
[ 20.660917] ================================================================== [ 20.662074] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 20.663111] Read of size 1 at addr ffff88810393fd02 by task kunit_try_catch/267 [ 20.663614] [ 20.663797] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.663863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.664407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.664487] Call Trace: [ 20.664528] <TASK> [ 20.664572] dump_stack_lvl+0x73/0xb0 [ 20.664661] print_report+0xd1/0x650 [ 20.664739] ? __virt_addr_valid+0x1db/0x2d0 [ 20.664820] ? kasan_stack_oob+0x2b5/0x300 [ 20.664914] ? kasan_addr_to_slab+0x11/0xa0 [ 20.664987] ? kasan_stack_oob+0x2b5/0x300 [ 20.665059] kasan_report+0x141/0x180 [ 20.665134] ? kasan_stack_oob+0x2b5/0x300 [ 20.665216] __asan_report_load1_noabort+0x18/0x20 [ 20.665296] kasan_stack_oob+0x2b5/0x300 [ 20.665367] ? __pfx_kasan_stack_oob+0x10/0x10 [ 20.665432] ? finish_task_switch.isra.0+0x153/0x700 [ 20.665502] ? __switch_to+0x47/0xf50 [ 20.665595] ? __schedule+0x10cc/0x2b60 [ 20.665677] ? __pfx_read_tsc+0x10/0x10 [ 20.665753] ? ktime_get_ts64+0x86/0x230 [ 20.665829] kunit_try_run_case+0x1a5/0x480 [ 20.665928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.666007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.666082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.666173] ? __kthread_parkme+0x82/0x180 [ 20.666206] ? preempt_count_sub+0x50/0x80 [ 20.666237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.666285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.666321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.666356] kthread+0x337/0x6f0 [ 20.666383] ? trace_preempt_on+0x20/0xc0 [ 20.666414] ? __pfx_kthread+0x10/0x10 [ 20.666443] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.666474] ? calculate_sigpending+0x7b/0xa0 [ 20.666511] ? __pfx_kthread+0x10/0x10 [ 20.666647] ret_from_fork+0x116/0x1d0 [ 20.666678] ? __pfx_kthread+0x10/0x10 [ 20.666707] ret_from_fork_asm+0x1a/0x30 [ 20.666749] </TASK> [ 20.666763] [ 20.689341] The buggy address belongs to stack of task kunit_try_catch/267 [ 20.691006] and is located at offset 138 in frame: [ 20.691633] kasan_stack_oob+0x0/0x300 [ 20.692174] [ 20.692410] This frame has 4 objects: [ 20.692948] [48, 49) '__assertion' [ 20.693028] [64, 72) 'array' [ 20.693485] [96, 112) '__assertion' [ 20.694685] [128, 138) 'stack_array' [ 20.695323] [ 20.696516] The buggy address belongs to the physical page: [ 20.697014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10393f [ 20.698267] flags: 0x200000000000000(node=0|zone=2) [ 20.698937] raw: 0200000000000000 ffffea00040e4fc8 ffffea00040e4fc8 0000000000000000 [ 20.699944] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 20.700797] page dumped because: kasan: bad access detected [ 20.701228] [ 20.702022] Memory state around the buggy address: [ 20.702742] ffff88810393fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 20.703288] ffff88810393fc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 20.703810] >ffff88810393fd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 20.705050] ^ [ 20.705565] ffff88810393fd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 20.706534] ffff88810393fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.707274] ==================================================================
[ 21.870801] ================================================================== [ 21.872294] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 21.873964] Read of size 1 at addr ffff888103b07d02 by task kunit_try_catch/267 [ 21.874535] [ 21.874869] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.875003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.875043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.875108] Call Trace: [ 21.875151] <TASK> [ 21.875201] dump_stack_lvl+0x73/0xb0 [ 21.875296] print_report+0xd1/0x650 [ 21.875362] ? __virt_addr_valid+0x1db/0x2d0 [ 21.875432] ? kasan_stack_oob+0x2b5/0x300 [ 21.875492] ? kasan_addr_to_slab+0x11/0xa0 [ 21.875573] ? kasan_stack_oob+0x2b5/0x300 [ 21.875633] kasan_report+0x141/0x180 [ 21.875695] ? kasan_stack_oob+0x2b5/0x300 [ 21.875771] __asan_report_load1_noabort+0x18/0x20 [ 21.875854] kasan_stack_oob+0x2b5/0x300 [ 21.875929] ? __pfx_kasan_stack_oob+0x10/0x10 [ 21.875997] ? finish_task_switch.isra.0+0x153/0x700 [ 21.876073] ? __switch_to+0x47/0xf50 [ 21.876318] ? __schedule+0x10cc/0x2b60 [ 21.876389] ? __pfx_read_tsc+0x10/0x10 [ 21.876423] ? ktime_get_ts64+0x86/0x230 [ 21.876460] kunit_try_run_case+0x1a5/0x480 [ 21.876530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.876656] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.876709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.876745] ? __kthread_parkme+0x82/0x180 [ 21.876775] ? preempt_count_sub+0x50/0x80 [ 21.876806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.876845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.876881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.876917] kthread+0x337/0x6f0 [ 21.876947] ? trace_preempt_on+0x20/0xc0 [ 21.876985] ? __pfx_kthread+0x10/0x10 [ 21.877014] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.877047] ? calculate_sigpending+0x7b/0xa0 [ 21.877083] ? __pfx_kthread+0x10/0x10 [ 21.877113] ret_from_fork+0x116/0x1d0 [ 21.877139] ? __pfx_kthread+0x10/0x10 [ 21.877168] ret_from_fork_asm+0x1a/0x30 [ 21.877210] </TASK> [ 21.877245] [ 21.905190] The buggy address belongs to stack of task kunit_try_catch/267 [ 21.907746] and is located at offset 138 in frame: [ 21.909111] kasan_stack_oob+0x0/0x300 [ 21.911125] [ 21.911367] This frame has 4 objects: [ 21.911928] [48, 49) '__assertion' [ 21.911997] [64, 72) 'array' [ 21.912387] [96, 112) '__assertion' [ 21.912772] [128, 138) 'stack_array' [ 21.913543] [ 21.914925] The buggy address belongs to the physical page: [ 21.915745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b07 [ 21.916476] flags: 0x200000000000000(node=0|zone=2) [ 21.917182] raw: 0200000000000000 ffffea00040ec1c8 ffffea00040ec1c8 0000000000000000 [ 21.918698] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.920110] page dumped because: kasan: bad access detected [ 21.920623] [ 21.920837] Memory state around the buggy address: [ 21.921271] ffff888103b07c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 21.922059] ffff888103b07c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 21.922687] >ffff888103b07d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 21.924010] ^ [ 21.924380] ffff888103b07d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 21.924834] ffff888103b07e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.926157] ==================================================================
[ 22.443964] ================================================================== [ 22.445349] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 22.446032] Read of size 1 at addr ffff8000896f7c2a by task kunit_try_catch/302 [ 22.446721] [ 22.446895] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.446958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.446977] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.446999] Call trace: [ 22.447013] show_stack+0x20/0x38 (C) [ 22.447055] dump_stack_lvl+0x8c/0xd0 [ 22.447099] print_report+0x310/0x608 [ 22.447141] kasan_report+0xdc/0x128 [ 22.447181] __asan_report_load1_noabort+0x20/0x30 [ 22.447228] kasan_stack_oob+0x238/0x270 [ 22.447264] kunit_try_run_case+0x170/0x3f0 [ 22.447306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.447354] kthread+0x328/0x630 [ 22.447387] ret_from_fork+0x10/0x20 [ 22.447428] [ 22.453024] The buggy address belongs to stack of task kunit_try_catch/302 [ 22.453670] and is located at offset 138 in frame: [ 22.454130] kasan_stack_oob+0x0/0x270 [ 22.454511] [ 22.454671] This frame has 4 objects: [ 22.455029] [48, 49) '__assertion' [ 22.455057] [64, 72) 'array' [ 22.455400] [96, 112) '__assertion' [ 22.455700] [128, 138) 'stack_array' [ 22.456050] [ 22.456548] The buggy address belongs to the virtual mapping at [ 22.456548] [ffff8000896f0000, ffff8000896f9000) created by: [ 22.456548] kernel_clone+0x150/0x7a8 [ 22.457957] [ 22.458120] The buggy address belongs to the physical page: [ 22.458643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf1d6 [ 22.459380] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.460017] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.460744] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.461462] page dumped because: kasan: bad access detected [ 22.461985] [ 22.462143] Memory state around the buggy address: [ 22.462602] ffff8000896f7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.463279] ffff8000896f7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 22.463956] >ffff8000896f7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 22.464628] ^ [ 22.465065] ffff8000896f7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 22.465741] ffff8000896f7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 22.466413] ==================================================================